Вы находитесь на странице: 1из 6

Proceedings of the 28th IEEE SaC14.

4
EMBS Annual International Conference
New York City, USA, Aug 30-Sept 3, 2006

Security and Privacy Issues with Health Care Information Technology


Marci Meingast, Tanya Roosta, Shankar Sastry
Department of Electrical Engineering and Computer Sciences
University of California, Berkeley, CA, 94720
{marci, roosta, sastry}@eecs.berkeley.edu

Abstract— The face of health care is changing as new [1]. The council’s primary goal is to standardize everything
technologies are being incorporated into the existing infras- from medical terminology to networking protocols so that
tructure. Electronic Patient Records and sensor networks for medical records can be stored electronically and be instantly
in-home patient monitoring are at the current forefront of
new technologies. Paper-based patient records are being put sent anywhere in the world.
in electronic format enabling patients to access their records In order to communicate the data in EPRs, a relatively
via the Internet. Remote patient monitoring is becoming more small, but ever increasing percentage of health care groups
feasible as specialized sensors can be placed inside homes. The have created ’web portals’ that provide personalized patient
combination of these technologies will improve the quality of services via the web. The ”MyHealth@Vanderbilt” patient
health care by making it more personalized and reducing costs
and medical errors. While there are benefits to technologies, portal [15] and ”Patient-Centered Access to Secure Systems
associated privacy and security issues need to be analyzed to Online (PCASSO)” at University of California, San Diego
make these systems socially acceptable. In this paper we explore [9] are just some examples of developing advanced health
the privacy and security implications of these next-generation care sites. These sites provide a set of individualized services
health care technologies. We describe existing methods for to allow patients access to their clinical laboratory results and
handling issues as well as discussing which issues need further
consideration. other components of the electronic patient records. These
services have previously been available only to physicians
I. INTRODUCTION and other health care providers.
The health care system has long been plagued by problems Sensor network is another technology that is being
such as diagnoses being written illegibly on paper, doctors adopted. Both industry and academic institutions are de-
not being able to easily access patient information, and veloping sensor systems for remote patient monitoring. For
limitations on time, space, and personnel for monitoring example, Intel’s Integrated Digital Hospital (IDH) is aimed
patients. With advancements in technology, opportunities at improving health care worldwide by linking people, pro-
exist to improve the current state of health care to minimize cesses and technologies [17]. The IDH system combines
some of these problems and provide more personalized mobile point-of-care (MPOC) and other information tech-
service. For example, the embracing of the Internet by health nology to integrate patient and administrative information
care organizations in the last decade has provided a medium into a comprehensive, digital view of a patient’s health.
for publishing general health information allowing patients The Information Technology for Assisted Living at Home
to gain more knowledge about medical conditions. Currently, (ITALH) project at University of California, Berkeley is
more than 90% of the approximately 5000 member institu- looking at sensor networks for remote patient monitoring
tions of the American Hospital Association reported having [6]. This project aims to create a system based on wearable
web sites, with most having descriptive information about sensors that will allow people who require assistance to live
their facilities and services. at home to do so using information technology. Kansas State
Many technologies are currently being adopted by the University and the University of Alabama in Huntsville have
medical field. In this paper we look at the move towards Elec- a combined effort working on Wide Area Body Networks
tronic Patient Records(EPR) and the use of sensor networks (WABN) Infrastructures [12].They are developing wearable
for remote patient monitoring. With health care organizations health status monitoring systems that can be used for in home
transitioning to EPRs, information that was once stored in patient monitoring.
paper format will now be stored electronically allowing for These technologies will provide many benefits for health
easy accessibility and use. Aiding this transition, IEEE has care delivery, yet there are a number of security and privacy
joined forces with the American Medical Association and implications that must be explored in order to promote
eight other major nonprofit medical and engineering societies and maintain fundamental medical ethical principles and
to form an umbrella consortium, the Biotechnology Council social expectations. These issues include access rights to
data, how and when data is stored, security of data transfer,
data analysis rights, and the governing policies. While there
This work was supported in part by TRUST (The Team for Research in are current regulations for medical data, these must be re-
Ubiquitous Secure Technology), which receives support from the National evaluated as an adaption of new technology changes how
Science Foundation (NSF award number CCF-0424422) and the following
organizations: Cisco, ESCHER, HP, IBM, Intel, Microsoft, ORNL, Qual- health care delivery is done.
comm, Pirelli, Sun and Symantec. In this paper we explore the security and privacy is-

1-4244-0033-3/06/$20.00 ©2006 IEEE. 5453


sues surrounding electronic health care records with patient within the home. This local base station, e.g. a personal
portals and remote sensor networks for patient monitoring. computer, evaluates the data sent back by the sensors. For
In section 2, we provide some basic background on these example, if data of an abnormality in vital signs appears,
systems and what standards are currently being used. We the local base station can send the sensor data, along with
explore the security and privacy issues surrounding how the an alarm, to a central monitoring station. This enables the
medical data will be used and transmitted in these systems health care providers at the central monitoring station to take
and the current regulatory system for health care data in the appropriate steps to aid the patient. The transmission of
section 3. Section 4 discusses existing solutions as well as the information between the home and the monitoring site is
what future work needs to be done to make the systems more done through the Internet. This type of system minimally
secure and eliminate the privacy concerns. We conclude in restricts the patients daily activities, while still allowing
section 5 with a summary and recommendations. him/her to be monitored.

II. T ECHNICAL BACKGROUND C. An Integrated System


Sensor networks for remote patient monitoring and EPRs In order to get the most benefit out of these technolo-
take advantage of the existing technologies, such as the Inter- gies, the two systems can be integrated. Once sensor data
net and wireless communication. We describe the technical is transmitted to the central monitoring station, it can be
implementation of these systems in order to motivate the incorporated into the patient’s EPR. This information can be
discussion of security and privacy concerns. used to aid in better health care delivery by giving a more
detailed description of the patient’s medical situation.
A. Electronic Patient Records
III. PRIVACY AND SECURITY ISSUES
Electronic patient records take the current paper-based
documents and convert them to a digital format so they are While the above mentioned technologies can help improve
available electronically. The records include different types overall quality of health care delivery, the benefits of these
of data, such as physician’s notes, MRIs, and clinical lab technologies must be balanced with the privacy and security
results. Using EPRs allows real-time access to health care concerns of the user. Data from in-home sensors and medical
records independent of the physical location of the user. records will be communicated electronically via the Internet
Physicians, nurses, insurance companies, and patients can all and wireless transmissions. This increases the danger of
access the records over the Internet. EPRs reduce the number compromising the security and privacy of individuals which
of errors due to illegibility, and inconsistency of terms. In we analyze in this section.
addition, electronic records can be backed up more easily
A. Data Access and Storage
than paper-based records which prevents data loss [10],[1].
The implementation of EPRs includes a local data base There has long been concern over a patient’s health
that collects all the information for records of patients at record privacy and confidentiality [5]. Connecting personal
a certain location. For example, each hospital may have health information to the Internet exposes this data to more
its own electronic database of patient information. These hostile attacks compared to the paper-based medical records.
local data bases can then be connected via the Internet Currently, patients have to physically go into a health care
for data transmission so that a doctor at one hospital may facility to get their medical record. Since the records are in
view a patient’s information from another hospital. Using the paper format, this physically limits the number of people
Internet and interfaces designed for presenting these records, who see the record and how it gets transmitted.
such as the patient portal at Vanderbilt and PCASSO, a However, once this information is available electronically,
patient’s data can be transmitted to physicians, the patient it opens the door for hackers and other malicious attackers
at home, and other health care providers. to access the records as well as those who are authorized. In
addition, given the distributed nature of sensor networks for
B. In-home Remote Patient Monitoring in-home patient monitoring, there is a greater challenge in
With the evolution of sensor networks, real-time in-home ensuring data security and integrity compared to the tradi-
patient monitoring is more feasible. Figure 1 shows the tional health care system. Eavesdropping and skimming are
overall remote patient monitoring system. Different types of a possibility when the sensor data is transmitted wirelessly.
sensors can be used at home to monitor a patient’s vital Data access, storage, and integrity are key challenges when
signs. Wearable devices, such as electrocardiogram sensors implementing EPRs and in-home sensor networks.
and pulse oximeters, are being used along with non-wearable In order to deal with the challenges of electronic data
ambient temperature and humidity sensors. New sensors are and remote transmission of the information, the following
also being developed to do different forms of monitoring. For questions need to be answered:
example, wearable fall detectors that include accelerometers • Who owns the data? Who has the authority to delete,
are being developed by ITALH [2]. edit, and add information to health data as well as
In most of these systems, a periodic report from the sen- enforce regulations surrounding it? Do individual pa-
sors is sent back via wireless communication, using ZigBee, tients own data collected on themselves? Do their
Bluetooth, or other technologies, to a local base station physicians own the data? Do their insurance providers

5454
Fig. 1. The remote patient monitoring system.

own the data? Are they all joint owners? The question possible while still achieving the desired level of health
of ’who owns the data’ is particularly troublesome and care.
unsettled.It has been the object of recurrent, highly- • Where should the health data be stored? This is a
publicized lawsuits and congressional inquiries. Fur- question of centralized versus decentralized storage. In
thermore, some HMOs have been refusing to cover a the case of EPRs, should data reside in local databases
patient’s expenses when the patient has participated in that can be connected to each other, or should it be
clinical treatment protocols that are experimental [3]. stored in a central database? In the case of remote
This bring up the question that if the insurance provider patient monitoring, should the raw sensor data be stored
does not own the patient’s data, can they then refuse only locally or should it also be stored at the central
to pay for expenses associated with the collection and monitoring station? What type of data storage will best
storage of the data? This question in turn affects third accommodate the privacy and security needs?
party rights. If data is passed to a third party, do they • Who can view a patient’s medical record? We divide
have the same authority as the data owner, or are their the EPR users into two categories: a) users with the
rights more narrow? It is unclear what level of privacy read/write privileges - such as the doctors and nurses,
and security protection must be maintained when data who can not only view a patient’s EPR, but can also
is transferred to a third party. edit the records. b) users with read only privileges -
• What type of data, and how much data, should for example, the insurance provider might be limited
be stored? Doctors’ notes, MRIs, and lab test results to only viewing the patient’s EPR, but can not edit
are examples of data that is stored in patient’s paper- it. Depending on which user is accessing the EPR,
based record. Regarding EPRs, should all of this data there might be further restrictions on which portions
be electronically stored or will a subset of this data of the data their privileges apply to. For example, in
be sufficient for health care purposes? For example, the case of an insurance provider, their access might
data may be aggregated and the results stored, and be limited to the part of the EPR which facilitates
this may be enough information for the EPR users. the reimbursement for medical expenses. In another
This question also applies to the case of remote patient example, an elderly patient might want to authorize
monitoring using sensor networks. For example, should partial viewing of his/her medical record to certain
the bulk of the raw data be stored locally at the patient’s relatives.
residence, while only the aggregated data required for • To whom should this information be disclosed to
diagnosis and emergency response is transmitted back without the patient’s consent? There are situations
to the monitoring center? The amount of sensor data in which the patient’s health information needs to be
that is stored in the central location needs to be just disclosed to people other than the previously authorized
enough to accomplish the tasks related to the patient users. For example, in the case of remote patient mon-
care. Any extra information will not have a significant itoring, an emergency might necessitate disclosure of
impact on patient care, but may further compromise the health data without the patient’s consent in order for
individual’s privacy. In both cases the granularity of data that patient to receive necessary care.
collected and stored needs to be minimized as much as

5455
B. Data Mining allowed? Ethical practices are not well defined for the vast
array of disclosures to secondary users, such as managed
Data mining is the process of analyzing data to identify care evaluators and insurance companies1 .
patterns and/or relationships. Human medical data is seen These issues surrounding data mining need to be evaluated
to be one of the more rewarding and yet most difficult and regulations put in place to maximize the benefits from
of all biological data to mine and analyze. Data mining having more medical data readily available, while minimiz-
on human subjects can provide observations that cannot be ing harmful effects.
gained or easily extrapolated from animal studies. Visual and
auditory sensations, the perception of pain, discomfort, and C. Conflicting Regulatory Framework
other reaction can be hard to learn from tests on animals
There are currently many different regulations and rules
[3]. However, when mining on human data, there are unique
surrounding health care including the Federal Regulations of
privacy and security constraints that limit what collection,
The American Health Insurance Portability and Accountabil-
distribution, and analysis can be done.
ity Act(HIPAA) as well as various state regulations. While
Currently, large amounts of medical data is not stored these regulations provide a framework of policy, they will
electronically and cannot be mined. Yet there are still have to be adapted as EPRs and sensors change the way
thousands of terabytes of electronic human data generated health care is delivered.
annually in North America and Europe. While the type
HIPAA is a set of rules to be followed by doctors, hospitals
of data mining done on this information has security and
and other health care providers. HIPAA’s goal is to ensure
privacy concerns, the heterogeneity of the databases and the
that all medical records, medical billing, and patient accounts
scattering of the data throughout the medical care facilities
meet certain consistent standards with regards to documenta-
without any common format or principles of organization,
tion, handling and privacy. Moreover, HIPAA requires that all
restrict what can be done. As EPRs become widespread,
patients be able to access their own medical records, correct
more health organizations will have databases which store
errors or omissions, and be informed how their personal
patient information in a common computerized format. This
information is shared or used. Other provisions of HIPAA
data can then be easily shared over the communication
include notification of privacy procedures to the patients [14].
network which will create a larger source of human medical
At the same time, each state has specialized rules for how
data. Given this increase in available data, the role of data
health care is handled, which are nicely described by the
mining and how it is governed needs to be assessed.
Health Privacy Project’s The State of Health Privacy[13]
From mining on medical data, one may be able to cate- . For example, the Alabama Code has no general statute
gorize and profile patients based on numerous factors such granting patients the right to access their own medical
as age, gender,or disease. This may lead to discriminatory records. It also does not have a general statute restricting the
and exclusionary effects. As this data becomes a more of a disclosure of confidential information. However, regarding
”commodity” that can be passed over the Internet and col- certain medical conditions, such as mental health disorders
lected, it is important that anonymity of data happens before and sexually transmitted diseases, Alabama has some statutes
any data mining takes place. The question of what anonymity that control a patient’s access to information as well as
entails and regulations for data disclosures to users, such as disclosure of this information. Alabama Code also restricts
managed care evaluators and insurance companies, all must disclosures of medical information by HMOs. In contrast,
be answered in terms of data mining. California statutes grant patients the right of access to
Anonymizing data can happen on multiple levels. For their health care information from health care providers,
example, removing personal identifiers such as name, age, HMOs, insurers, and state agencies. California Code also
and social security number may make it hard to link data has extensive regulations on disclosure and use of health
up to a unique individual. However, even this may not make care information by these entities.
the data anonymous enough to prevent discriminatory effects. There is a need to have cohesive policies to protect
The data, while not correlated to a unique individual, may be sensitive personal health information as it becomes avail-
able to be linked to a larger sub-population, such as people able electronically. With the varying state codes there are
who live in a specific geographic region or people of a certain uncertainties in data ownership, access rights, and disclosure
gender/race. What the appropriate level of anonymity is for as data may gets passed across state lines electronically.
a given data mining task must therefore be evaluated. The HIPAA Privacy Protection mandates from 2003 are a
This leads to the question of who should have access to foundation for a national standard for health privacy [14].
the data and at what level of anonymity. The information However, they are a minimum set of rules. They are a
from a PC for at home patient monitoring may send the ’baseline’ with minimum protections for consumers with
data to the hospital with some identifying tag on it to signal stronger or more stringent state laws still remaining in effect.
what patient the data is coming from. The physician needs States are also free to enact stronger protections in the future.
to know who the patient is and may need to do some mining As an example, under the HIPAA Privacy Protection rules,
on the data over time, but does the insurance provider? no consent is necessary by the patient for one doctor’s office
What level of knowledge do different providers get? What
level of data mining capabilities should different providers be 1 Primary users refers to patients, physicians, nurses, and other clinicians.

5456
to transfer a patient’s medical records to another doctor’s • Define clear attributes for role based access: Clear
office for treatment purposes. If the state laws governing rules for the role-based access need to be defined so that
disclosure and use of this information are more stringent these systems can be put in place. These can be dynamic
in the patient’s home state than the state the record is rules or static rules depending on what is appropriate.
transferred to, the patient might have security and privacy • Policy development: New policy needs to be created
expectations that may not be upheld. While this can happen that can deal with across state jurisdiction. While the
with paper based medical information, the move toward HIPAA Privacy Rules provide some groundwork, more
electronic medical data increases the ease and amount of needs to be done to create clear rules that users can
data which can be transferred across states. rely upon. The move toward EPRs and the increasing
amount of medical data that will be gathered due to
IV. SOLUTIONS remote sensor networks, creates the ability to transfer
In this section we discuss the existing solutions as well as large amounts of data quickly. This necessitates a com-
open research questions regarding these privacy and security prehensive set of regulations that protect a user’s privacy
concerns. and security independent of which state the data is lo-
cated in. In the current setting many patients are not sure
A. Existing Solutions about their privacy rights regarding medical data and are
ill-informed. As more medical data becomes electronic
The issues of data access, storage, and analysis are not
and can be easily transmitted, this will magnify the
unique to the medical arena. These problems have been
confusion of users unless clear guidelines are defined.
looked an in a number of areas, from financial services to
• Rules on patients privacy at home: Can the patient
internet shopping, and technical solutions exist which can be
have full control over how much of the data is sent to
applied to health care to increase privacy and security in a
the central monitoring station, or does the patient only
multi-user setting:
have partial control? Guidelines need to be drawn which
• Role-based access control: one of the most challenging will regulate what sensor data collection entails and who
problems in managing large networks is the complex- will have control over it.
ity of security administration [16]. Role based access • Data mining rules and technological measures: These
control, or role based security, is the dominant model include not only who has the right to analyze what type
for advanced access control. It results in the reduction of data, but also include the rules on anonymizing the
of the complexity and cost of security administration in collected data. The appropriate technical methods for
large networked applications. An example of role based ensuring these rules then need to be put in place if some
access control for health care is in [7]. form of automation is possible.
• Encryption: Encryption can be used to ensure the
security of the data and help prevent eavesdropping V. CONCLUSION
and skimming. Encryption can be accomplished in
hardware as well as in software. In order to ensure Technology is enabling medical health records to be put
the highest level of security, it is best if both forms in the electronic format, EPRs, and making them available
of encryption are used. Different symmetric and asym- to the users via the Internet. In addition, advances in the
metric key algorithms can be used to provide encryption area of sensor networks are making the idea of remote
in software [11]. In sensor networks, TinySec [8] is patient monitoring a reality. In this paper we discussed the
specifically designed to provide encryption and authen- privacy and security issues that arise when integrating these
tication capabilities. TinySec is already employed by new technology into the traditional health care system. We
some medical sensor systems such as the Kansas State explored some of the existing solutions that can be employed
University/University of Alabama in Huntsville WBAN. and the open research questions that need to be answered
• Authentication Mechanisms: Authentication mecha- before the widespread use of the new technology is possible
nisms can be used to ensure the data is coming from the with minimal security and privacy risks.
person/entity it is claiming to be from [11]. There has
been a number of authentication algorithms developed R EFERENCES
such as passwords, digital signatures, and challenge-
response authentication protocol. There are methods [1] Trudy E. Bell, Medical Records: From Clipboard To Point-and-
Click,The Institute, December 2006.
designed for sensor networks that are more energy [2] Garrett Brown, An Accelerometer Based Fall Detector: Development,
efficient, such as the hash function in TinySec, that can Experimentation, and Analysis, Internal Report, University of Califor-
be used for authentication. nia at Berkeley, July 2005.
[3] K.J. Cios and G.W. Moore, Uniqueness of Medical Data Mining,
Artificial Intelligence in Medicine Journal, 2002.
B. Future Work [4] Computer Science and Telecommunications Board, National Research
While there are methods that can be employed to aid Council, For the Record: Protecting Electronic Health Information.
Washington, DC: National Academy Pr; 1997.
in security and privacy of medical data with these new [5] Computer Science and Telecommunications Board, Networking
technologies, there are still areas that can be improved upon. Health: Prescriptions for the Internet,2000.

5457
[6] J. Mikael Eklund, Thomas Riisgaard Hansen, Jonathan Sprinkle and
Shankar Sastry, Information Technology for Assisted Living at Home:
building a wireless infrastructure for assisted living, EMBC 2005,
Shanghai China, September, 2005.
[7] M. Evered, S. Bogeholz, A Case Study in Access Control Requirements
for a Health Information System, Australasian Information Security
Workshop, 2004.
[8] C. Karlof, N. Sastry, and D. Wagner, TinySec: A Link Layer Security
Architecture for Wireless Sensor Networks, Conference on Embedded
Networked Sensor Systems, 2004).
[9] D. Masys, D. Baker, A. Butros , K.E. Cowles, Giving patients access
to their medical records via the internet: the PCASSO experience,
Journal of American Medical Informatics Association, 2002 Mar-Apr;
9(2):181-91.
[10] Simon Rogerson, Electronic Patient Records,IMIS Journal Volume
10,No. 5, October, 2000.
[11] Serge Vaudenay, A Classical Introduction to Cryptography : Applica-
tions for Communications Security, Springer, 2006.
[12] S. Warren, J. Lebak , J. Yao , J. Creekmore , A. Milenkovic , and E.
Jovanov, Interoperability and Security in Wireless Body Area Network
Infrastructures, EMBC, Shanghai China, September 2005.
[13] Health Privacy Project at
www.healthprivacy.org/info-url nocat2304info-url nocat.htm
[14] HIPAA 101.com - Info Guide to HIPAA Compliance, Implementation
and Privacy at www.hipaa-101.com
[15] MyHealthAtVanderbilt at www.MyHealthatVanderbilt.com
[16] Role Based Access Control at http://csrc.nist.gov/rbac
[17] Solutions for Improving Healthcare at
http://www.intel.com/business/bss/industry/healthcare/index.htm

5458

Вам также может понравиться